General
-
Target
2d9972a8141d738c957eb76e5c7a4ddb08faeb2ee353e38dcee57a723bf5d33c
-
Size
530KB
-
Sample
230401-vgdw9scf6t
-
MD5
1add8cfd5b9474e75eb5ead860568e27
-
SHA1
338c0899cae5131ed76339d3b46ea65f30c4e1bb
-
SHA256
2d9972a8141d738c957eb76e5c7a4ddb08faeb2ee353e38dcee57a723bf5d33c
-
SHA512
a79d508c3c58a88cf0edd4b3efb5141b02dbb5b80fc16a17d726d3aa0902009eb20c39eb2f80a4a26e990035dcd1643e7cb1e30827cc71dd497ac8dc08afa0b5
-
SSDEEP
12288:HMrwy90Emh4ml6Q1kA34gE86xw/5rrRmc8:/yCinQ1H34gE8wKh+
Static task
static1
Behavioral task
behavioral1
Sample
2d9972a8141d738c957eb76e5c7a4ddb08faeb2ee353e38dcee57a723bf5d33c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
2d9972a8141d738c957eb76e5c7a4ddb08faeb2ee353e38dcee57a723bf5d33c
-
Size
530KB
-
MD5
1add8cfd5b9474e75eb5ead860568e27
-
SHA1
338c0899cae5131ed76339d3b46ea65f30c4e1bb
-
SHA256
2d9972a8141d738c957eb76e5c7a4ddb08faeb2ee353e38dcee57a723bf5d33c
-
SHA512
a79d508c3c58a88cf0edd4b3efb5141b02dbb5b80fc16a17d726d3aa0902009eb20c39eb2f80a4a26e990035dcd1643e7cb1e30827cc71dd497ac8dc08afa0b5
-
SSDEEP
12288:HMrwy90Emh4ml6Q1kA34gE86xw/5rrRmc8:/yCinQ1H34gE8wKh+
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-